Search Results - "Wang, Caifen"
-
1
An environmental monitoring data sharing scheme based on attribute encryption in cloud-fog computing
Published in PloS one (30-09-2021)“…Environmental monitoring plays a vital role in environmental protection, especially for the management and conservation of natural resources. However,…”
Get full text
Journal Article -
2
Security analysis and secure channel-free certificateless searchable public key authenticated encryption for a cloud-based Internet of things
Published in PloS one (09-04-2020)“…With the rapid development of informatization, an increasing number of industries and organizations outsource their data to cloud servers, to avoid the cost of…”
Get full text
Journal Article -
3
Facial cutaneous tuberculosis infected by non-tuberculous mycobacteria
Published in BMC infectious diseases (09-10-2024)“…Cutaneous infections caused by non-tuberculous mycobacteria (NTM) are extremely rare, particularly when they are localized to the facial area. This condition…”
Get full text
Journal Article -
4
HSC-MET: Heterogeneous signcryption scheme supporting multi-ciphertext equality test for Internet of Drones
Published in PloS one (29-09-2022)“…Internet of Drones (IoD) is considered as a network and management architecture, which can enable unmanned aerial vehicles (UAVs) to collect data in controlled…”
Get full text
Journal Article -
5
Medical Data Sharing Scheme Based on Attribute Cryptosystem and Blockchain Technology
Published in IEEE access (01-01-2020)“…Electronic medical data have significant advantages over paper-based patient records when it comes to storage and retrieval. However, most existing medical…”
Get full text
Journal Article -
6
Solidification of volatile D-Limonene by cyclodextrin metal-organic framework for pulmonary delivery via dry powder inhalers: In vitro and in vivo evaluation
Published in International journal of pharmaceutics (05-09-2021)“…[Display omitted] D-Limonene (D-Lim), a volatile oil extracted from citrus fruits, has therapeutic effects on lung inflammation and cancer, whilst the deep…”
Get full text
Journal Article -
7
A certificateless linearly homomorphic signature scheme for network coding and its application in the IoT
Published in Peer-to-peer networking and applications (01-03-2021)“…Network coding is an effective method to optimize network throughput and improve routing reliability, and has been widely used in a decentralized Internet of…”
Get full text
Journal Article -
8
HSC-MET: Heterogeneous signcryption scheme supporting multi-ciphertext equality test for Internet of Drones
Published in PloS one (29-09-2022)“…Internet of Drones (IoD) is considered as a network and management architecture, which can enable unmanned aerial vehicles (UAVs) to collect data in controlled…”
Get full text
Journal Article -
9
A Secure and Lightweight Fine-Grained Data Sharing Scheme for Mobile Cloud Computing
Published in Sensors (Basel, Switzerland) (21-08-2020)“…With the explosion of various mobile devices and the tremendous advancement in cloud computing technology, mobile devices have been seamlessly integrated with…”
Get full text
Journal Article -
10
Heterogeneous hybrid signcryption for multi-message and multi-receiver
Published in PloS one (08-09-2017)“…To achieve secure communication in heterogeneous cryptography systems, we present a heterogeneous hybrid signcryption scheme. The proposed scheme allows a…”
Get full text
Journal Article -
11
Cross-linked γ-cyclodextrin metal-organic framework—a new stationary phase for the separations of benzene series and polycyclic aromatic hydrocarbons
Published in Mikrochimica acta (1966) (01-08-2021)“…The cross-linked γ-cyclodextrin metal-organic framework (CL-CD-MOF) was synthesized by crosslinking γ-cyclodextrin metal-organic framework (γ-CD-MOF) with…”
Get full text
Journal Article -
12
Obfuscating encrypted threshold signature algorithm and its applications in cloud computing
Published in PloS one (16-04-2021)“…Current cloud computing causes serious restrictions to safeguarding users' data privacy. Since users' sensitive data is submitted in unencrypted forms to…”
Get full text
Journal Article -
13
Multi-Replica and Multi-Cloud Data Public Audit Scheme Based on Blockchain
Published in IEEE access (01-01-2020)“…Cloud storage services provide convenient data storage services for individuals and enterprises. Data owners can remotely access and update outsourcing data…”
Get full text
Journal Article -
14
Multi-Keyword Certificateless Searchable Public Key Authenticated Encryption Scheme Based on Blockchain
Published in IEEE access (2020)“…As a quite attractive secure search mechanism in cloud environments, searchable encryption allows encrypted files to be searched by keyword and does not reveal…”
Get full text
Journal Article -
15
MOF Capacitates Cyclodextrin to Mega-Load Mode for High-Efficient Delivery of Valsartan
Published in Pharmaceutical research (01-08-2019)“…Purpose To investigate the mechanism of enhancing solubility and bioavailability of water-insoluble drug, valsartan (VAL), with being mega-loaded by…”
Get full text
Journal Article -
16
A Blockchain-Assisted Verifiable Outsourced Attribute-Based Signcryption Scheme for EHRs Sharing in the Cloud
Published in IEEE access (2020)“…The sharing of electronic health records (EHRs) has shown great advantages in the accurate treatment of patients and the development of medical institutions…”
Get full text
Journal Article -
17
A short certificateless aggregate signature against coalition attacks
Published in PloS one (12-12-2018)“…Certificateless aggregate signature (CLAS) is a crucial cryptosystem. It can not only compress multiple signatures into a short signature, but also ensure the…”
Get full text
Journal Article -
18
Drug nanoclusters formed in confined nano-cages of CD-MOF: dramatic enhancement of solubility and bioavailability of azilsartan
Published in Acta pharmaceutica Sinica. B (01-01-2019)“…Tremendous efforts have been devoted to the enhancement of drug solubility using nanotechnologies, but few of them are capable to produce drug particles with…”
Get full text
Journal Article -
19
Revocable identity-based proxy re-signature against signing key exposure
Published in PloS one (26-03-2018)“…Identity-based proxy re-signature (IDPRS) is a novel cryptographic primitive that allows a semi-trusted proxy to convert a signature under one identity into…”
Get full text
Journal Article -
20
Stateless Cloud Auditing Scheme for Non-Manager Dynamic Group Data With Privacy Preservation
Published in IEEE access (2020)“…As one of the core services of cloud computing, cloud storage could satisfy various storage and management requirements caused by the growth of data…”
Get full text
Journal Article